kerne1_p4n1c's profile picture. Against the bugz 🧐
Pentesting , RedTeaming , Infosec lover.

hadOkeN

@kerne1_p4n1c

Against the bugz 🧐 Pentesting , RedTeaming , Infosec lover.

hadOkeN reposted

Windows API arsenal by @0x6970 for reversers blog.fautl.com/api-list.html

struppigel's tweet image. Windows API arsenal by
@0x6970
for reversers 

blog.fautl.com/api-list.html
struppigel's tweet image. Windows API arsenal by
@0x6970
for reversers 

blog.fautl.com/api-list.html

hadOkeN reposted

Reverse engineering the obfuscated TikTok VM : github.com/LukasOgunfeiti…


hadOkeN reposted

NEW TOOL: ITOA (Image to ASCII) Convert your images to an ASCII canvas, monochrome or colored, and save them into a separate image. Works on mobile (but large size is more limited than on desktop).


hadOkeN reposted

A #vulnerability in VMware ESXi hypervisors has been exploited by #ransomware groups to gain administrative access and deploy #malware. It allows attackers to escalate privileges easily, posing a severe risk to organizations using ESXi. thehackernews.com/2024/07/vmware… #CyberSecurity


hadOkeN reposted

Find and execute WinAPI functions with Assembly (Shellcode x64) : print3m.github.io/blog/x64-winap… credits @Print3M_ shellcodes : github.com/Print3M/shellc…

binitamshah's tweet image. Find and execute WinAPI functions with Assembly   (Shellcode x64) : print3m.github.io/blog/x64-winap…  credits @Print3M_

shellcodes : github.com/Print3M/shellc…
binitamshah's tweet image. Find and execute WinAPI functions with Assembly   (Shellcode x64) : print3m.github.io/blog/x64-winap…  credits @Print3M_

shellcodes : github.com/Print3M/shellc…

hadOkeN reposted

DarkGate loader has the most sophisticated loader we've ever seen. It's over for the anti-virus industry. How would anyone defeat or detect this?!

vxunderground's tweet image. DarkGate loader has the most sophisticated loader we've ever seen. It's over for the anti-virus industry. How would anyone defeat or detect this?!

hadOkeN reposted

My new favourite technical drawing tool is Excalidraw.. Just the right amount of unprofessionalism to keep the inner anarchist alive.

_xpn_'s tweet image. My new favourite technical drawing tool is Excalidraw.. Just the right amount of unprofessionalism to keep the inner anarchist alive.

hadOkeN reposted

🤯 OpenAI + Burp Suite = welcome to "ReconAIzer" A powerful extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon process. 🔗Link: github.com/hisxo/ReconAIz… (It's not a serious project, it's just for fun 😂)

adrien_jeanneau's tweet image. 🤯 OpenAI + Burp Suite = welcome to "ReconAIzer" 

A powerful extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon process.

🔗Link: github.com/hisxo/ReconAIz…

(It's not a serious project, it's just for fun 😂)
adrien_jeanneau's tweet image. 🤯 OpenAI + Burp Suite = welcome to "ReconAIzer" 

A powerful extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon process.

🔗Link: github.com/hisxo/ReconAIz…

(It's not a serious project, it's just for fun 😂)

hadOkeN reposted

Speed up your subdomain port scanning by querying A records from a list subdomains and removing duplicate IP addresses 🏃‍♀️💨 You can do this easily by chaining subfinder, dnsx, sort and naabu together: subfinder -d <domain> 🔗 dnsx -a -ro 🔗 sort -u 🔗 naabu

pdiscoveryio's tweet image. Speed up your subdomain port scanning by querying A records from a list subdomains and removing duplicate IP addresses 🏃‍♀️💨

You can do this easily by chaining subfinder, dnsx, sort and naabu together:

subfinder -d &amp;lt;domain&amp;gt; 🔗 dnsx -a -ro 🔗 sort -u 🔗 naabu

hadOkeN reposted

CveEventWrite() seems to be the easiest way of putting your own events into the Application Event Log. Nothing to prepare in advance, no special privileges, just two PCWSTRs as params, one call, obvious result. Why cannot the rest of Event Logging API work the same way...?🙄

0gtweet's tweet image. CveEventWrite()  seems to be the easiest way of putting your own events into the Application Event Log. Nothing to prepare in advance, no special privileges, just two PCWSTRs as params, one call, obvious result.
Why cannot the rest of Event Logging API work the same way...?🙄

hadOkeN reposted

We’ve launched Maldev Academy Code Search! search.maldevacademy.com We’ve built two projects with the help of this service and posted the code and videos to the GitHub repository below: github.com/Maldev-Academy…

MalDevAcademy's tweet image. We’ve launched Maldev Academy Code Search!

search.maldevacademy.com

We’ve built two projects with the help of this service and posted the code and videos to the GitHub repository below:

github.com/Maldev-Academy…
MalDevAcademy's tweet image. We’ve launched Maldev Academy Code Search!

search.maldevacademy.com

We’ve built two projects with the help of this service and posted the code and videos to the GitHub repository below:

github.com/Maldev-Academy…

hadOkeN reposted

ssh has secrets. Too many to share in one tweet. One of which is how it acts as a serial-line processor for secret keyboard functionality you probably never knew about. For example, why, when you press ENTER and then ~ immediately after, does the ~ not appear right away? Thread…


hadOkeN reposted

Believe or not but used to do this a lot as a kid. Shells were hard to buy so my Dad made them on his own. Totally normal back then … now probably someone would call some agency to save my kids from me if I would do this at home 🤷

Reloading brass shotgun shells.



hadOkeN reposted

Ransomware Zero Days 2023

BushidoToken's tweet image. Ransomware Zero Days 2023

hadOkeN reposted

Lets bypass Cortex XDR again! Mortar v3 is out and comes with following features: -Fileless execution -Early Bird APC injection. -Process masquerading. -Supports Named Pipes. -Strings and function calls obfuscation. - covert reload subroutine. -Delay execution techniques.


hadOkeN reposted

Our friend @nikhil_mitt hooked us up with MORE stuff to giveaway for the holiday season. We've got 3 vouchers for the CARTP (Azure Red Teaming course). He's the real MVP. Thank you so much 🙏 Comment below for a chance to win Course details: alteredsecurity.com/azureadlab


hadOkeN reposted

I updated the EDR telemetry project with corrected telemetry and new additions! See below the changes and upcoming EDRs: ✅ Corrected Trend Micro Telemetry ✅ Corrected ESET Telemetry 🌟 Added Qualys EDR 🎯New Additions Coming Up: 🔜 Sophos EDR 🔜 Cortex EDR Vendors are…

Kostastsale's tweet image. I updated the EDR telemetry project with corrected telemetry and new additions! See below the changes and upcoming EDRs:

✅ Corrected Trend Micro Telemetry
✅ Corrected ESET Telemetry
🌟 Added Qualys EDR

🎯New Additions Coming Up:
🔜 Sophos EDR
🔜 Cortex EDR

Vendors are…

Loading...

Something went wrong.


Something went wrong.